Sciweavers

1305 search results - page 230 / 261
» Inferring Privacy Information from Social Networks
Sort
View
120
Voted
ICCCN
2008
IEEE
15 years 8 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz
ICDCS
2010
IEEE
15 years 5 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
120
Voted
SIGMOD
2010
ACM
223views Database» more  SIGMOD 2010»
15 years 6 months ago
Finding maximal cliques in massive networks by H*-graph
Maximal clique enumeration (MCE) is a fundamental problem in graph theory and has important applications in many areas such as social network analysis and bioinformatics. The prob...
James Cheng, Yiping Ke, Ada Wai-Chee Fu, Jeffrey X...
125
Voted
DCOSS
2009
Springer
15 years 8 months ago
Detection and Localization Sensor Assignment with Exact and Fuzzy Locations
Sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplifi...
Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro...
90
Voted
APVIS
2001
15 years 3 months ago
Visual Mapping of Articulable Tacit Knowledge
Tacit knowledge has long been recognised, however its research has focused largely on who is more likely to have this store of knowledge, rather than taking this one step further ...
Peter Busch, Debbie Richards, Christopher N. G. Da...